{"id":"https://openalex.org/W2067375012","doi":"https://doi.org/10.1109/tit.2013.2252393","title":"Secure Coding Over Networks Against Noncooperative Eavesdropping","display_name":"Secure Coding Over Networks Against Noncooperative Eavesdropping","publication_year":2013,"publication_date":"2013-04-16","ids":{"openalex":"https://openalex.org/W2067375012","doi":"https://doi.org/10.1109/tit.2013.2252393","mag":"2067375012"},"language":"en","primary_location":{"id":"doi:10.1109/tit.2013.2252393","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2013.2252393","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048805608","display_name":"Jin Xu","orcid":"https://orcid.org/0000-0003-0041-1427"},"institutions":[{"id":"https://openalex.org/I4210108985","display_name":"Bellevue Hospital Center","ror":"https://ror.org/01ky34z31","country_code":"US","type":"healthcare","lineage":["https://openalex.org/I1283621791","https://openalex.org/I4210086933","https://openalex.org/I4210108985"]},{"id":"https://openalex.org/I70983195","display_name":"Syracuse University","ror":"https://ror.org/025r5qe02","country_code":"US","type":"education","lineage":["https://openalex.org/I70983195"]},{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jin Xu","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, Syracuse University, Syracuse, NY, USA","Microsoft Corporation, Bellevue, WA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, Syracuse University, Syracuse, NY, USA","institution_ids":["https://openalex.org/I70983195"]},{"raw_affiliation_string":"Microsoft Corporation, Bellevue, WA, USA","institution_ids":["https://openalex.org/I1290206253","https://openalex.org/I4210108985"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100458392","display_name":"Biao Chen","orcid":"https://orcid.org/0000-0002-3559-2515"},"institutions":[{"id":"https://openalex.org/I70983195","display_name":"Syracuse University","ror":"https://ror.org/025r5qe02","country_code":"US","type":"education","lineage":["https://openalex.org/I70983195"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Biao Chen","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, Syracuse University, Syracuse, NY, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, Syracuse University, Syracuse, NY, USA","institution_ids":["https://openalex.org/I70983195"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5048805608"],"corresponding_institution_ids":["https://openalex.org/I1290206253","https://openalex.org/I4210108985","https://openalex.org/I70983195"],"apc_list":null,"apc_paid":null,"fwci":0.7093,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.75079153,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"59","issue":"7","first_page":"4498","last_page":"4509"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.8773068189620972},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7453230619430542},{"id":"https://openalex.org/keywords/equivocation","display_name":"Equivocation","score":0.6144362688064575},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6039498448371887},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.5939726829528809},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5602707266807556},{"id":"https://openalex.org/keywords/linear-network-coding","display_name":"Linear network coding","score":0.5351638793945312},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.4860823452472687},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.46023038029670715},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4059152901172638},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.37922772765159607},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.21122673153877258}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.8773068189620972},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7453230619430542},{"id":"https://openalex.org/C17859611","wikidata":"https://www.wikidata.org/wiki/Q10797615","display_name":"Equivocation","level":2,"score":0.6144362688064575},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6039498448371887},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.5939726829528809},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5602707266807556},{"id":"https://openalex.org/C138293262","wikidata":"https://www.wikidata.org/wiki/Q1089578","display_name":"Linear network coding","level":3,"score":0.5351638793945312},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.4860823452472687},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.46023038029670715},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4059152901172638},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.37922772765159607},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.21122673153877258},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tit.2013.2252393","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2013.2252393","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41999998688697815,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W18139138","https://openalex.org/W39715183","https://openalex.org/W1515040589","https://openalex.org/W1515701089","https://openalex.org/W1996360405","https://openalex.org/W2006947308","https://openalex.org/W2027214873","https://openalex.org/W2099111195","https://openalex.org/W2109394932","https://openalex.org/W2129885443","https://openalex.org/W2136395129","https://openalex.org/W2141420453","https://openalex.org/W2144007657","https://openalex.org/W2154501376","https://openalex.org/W2611093107","https://openalex.org/W2914714618","https://openalex.org/W2970097841","https://openalex.org/W4232836212","https://openalex.org/W4246219036","https://openalex.org/W6600739974","https://openalex.org/W6680315945","https://openalex.org/W6698135423"],"related_works":["https://openalex.org/W2145668821","https://openalex.org/W2157628738","https://openalex.org/W2147348113","https://openalex.org/W2376754011","https://openalex.org/W2154731600","https://openalex.org/W2007470205","https://openalex.org/W3022352698","https://openalex.org/W197063267","https://openalex.org/W3105440745","https://openalex.org/W2367279059"],"abstract_inverted_index":{"This":[0],"paper":[1],"studies":[2],"the":[3,25,28,31,45,74,104,112,121],"problem":[4],"of":[5,47,55],"secure":[6,63,84,122],"communication":[7,26,56,105,123],"over":[8],"a":[9,81],"noiseless":[10],"network":[11,21,59,106],"from":[12],"an":[13],"information-theoretic":[14],"perspective.":[15],"A":[16,65],"single-source":[17],"single-sink":[18],"acyclic":[19],"planar":[20],"is":[22,33,77,93,116],"considered,":[23],"and":[24,30,58,73,79],"between":[27],"source":[29],"sink":[32],"subject":[34],"to":[35,43,97],"noncooperative":[36],"eavesdropping":[37],"on":[38],"each":[39],"link.":[40],"Using":[41],"equivocation":[42,91],"measure":[44],"confidentiality":[46],"messages,":[48],"we":[49],"establish":[50],"sufficient":[51],"conditions,":[52],"in":[53],"terms":[54],"rates":[57],"parameters,":[60],"for":[61,125],"provably":[62],"communication.":[64],"constructive":[66],"proof,":[67],"which":[68],"combines":[69],"Shannon's":[70],"key":[71],"encryption":[72],"Ford-Fulkerson":[75],"algorithm,":[76],"provided":[78],"constitutes":[80],"readily":[82],"implementable":[83],"coding":[85],"scheme.":[86],"The":[87],"derived":[88],"achievable":[89],"rate":[90],"region":[92],"tight":[94],"when":[95,103],"specializing":[96],"several":[98],"special":[99],"cases.":[100],"In":[101],"particular,":[102],"decouples":[107],"into":[108],"nonoverlapping":[109],"parallel":[110],"paths,":[111],"proposed":[113],"encoding":[114],"scheme":[115],"optimal,":[117],"i.e.,":[118],"it":[119],"achieves":[120],"capacity":[124],"such":[126],"networks.":[127]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
